Stay ahead by continuously learning and advancing your career.. Learn More

Information Security Practice Exam

description

Bookmark 1200 Enrolled (0) Intermediate



Information Security Practice Exam


About Information Security
Information security refers to the processes and methodologies which are designed and implemented to protect print, electronic, or any other form of confidential, private and sensitive information or data from unauthorized access, use, misuse, disclosure, destruction, modification, or disruption.

Information Security programs are built around 3 objectives, commonly known as CIA – Confidentiality, Integrity, Availability.
•    Confidentiality – means information is not disclosed to unauthorized individuals, entities and process. For example if we say I have a password for my Gmail account but someone saw while I was doing a login into Gmail account. In that case my password has been compromised and Confidentiality has been breached.
•    Integrity – means maintaining accuracy and completeness of data. This means data cannot be edited in an unauthorized way. For example if an employee leaves an organisation then in that case data for that employee in all departments like accounts, should be updated to reflect status to JOB LEFT so that data is complete and accurate and in addition to this only authorized person should be allowed to edit employee data.
•    Availability – means information must be available when needed. For example if one needs to access information of a particular employee, in that case it requires collaboration from different organizational teams like network operations, development operations, incident response and policy/change management.

The means by which these principles are applied to an organization take the form of a security policy. This isn't a piece of security hardware or software; rather, it's a document that an enterprise draws up, based on its own specific needs and quirks, to establish what data needs to be protected and in what ways. These policies guide the organization's decisions around procuring cyber security tools, and also mandate employee behavior and responsibilities.

Why is Information Security important?
Information security performs four important roles:
•    It protects the organisation’s ability to function.
•    It enables the safe operation of applications implemented on the organisation’s IT systems.
•    It protects the data the organisation collects and uses.
•    It safeguards the technology the organisation uses.

Who should take the Information Security Exam?
•    IT security or audit professionals
•    Entrepreneurs
•    Anyone who wants to assess their information security skills
•    IT managers and senior executives
•    IT  consultants


Knowledge and Skills required for the Information Security Practice Exam

Candidate should have a good grasp of IT networking, operating system, web technology and cloud computing for succeeding in career as information security professional.


Information Security Practice Exam Objectives

Information Security exam focuses on verifying your skills and knowledge in concepts and application of information security for securing organizational computing resources.


Information Security Practice Exam Pre-requisite

Good knowledge of IT networking and computing is pre-requisite.





Information Security Certification Course Outline


1. Information Security Basics
1.1 What is information security
1.2 Need and Technical Terms
1.3 Skills Needed
1.4 Networking Basics
1.5 Penetration Testing

2. Cryptography
2.1 Cryptography Basics
2.2 Evolution and Data Encryption Methods
2.3 Symmetric and Asymmetric key Cryptography
2.4 Private and Public Key Exchange
2.5 Stream and Block Ciphers
2.6 Secret Key Cryptography
2.7 Message Authentication and Hash Functions
2.8 Digital Signatures and Public Key Infrastructure

3. Footprinting
3.1 Information Gathering
3.2 DNS, whois and ARIN records
3.3 Using traceroute, e-mail tracking and web spider
3.4 Google Hacking

4. Social Engineering
4.1 Social Engineering Concepts
4.2 Social Engineering Attack Types
4.3 Countermeasures for Social Engineering

5. Physical Security
5.1 Basics and Need
5.2 Physical Security Countermeasures

6. Network Scanning and Enumeration
6.1 Network Scanning Techniques
6.2 Scanners and Analyzers
6.3 HTTP tunneling and IP spoofing
6.4 Enumerating null sessions and SNMP enumeration

7. Network Attacks
7.1 TCP/IP Packet Formats and Ports
7.2 Firewall and IDS
7.3 Switch Attacks
7.4 Router Attacks
7.5 DoS, DDoS, Session Hijacking

8. Wireless Networks
8.1 Wireless LAN Basics
8.2 WLAN Security
8.3 WLAN Attacks
8.4 WLAN Attack Countermeasures

9. System Hacking
9.1 Password Attacks, Vulnerabilities and Countermeasure
9.2 Spyware
9.3 Rootkit
9.4 Steganography
9.5 Trojans
9.6 Computer worm
9.7 Backdoor
9.8 Buffer Overflow


Exam Format and Information
Certification name – Information Security Certification
Exam duration – 60 minutes
Exam type - Multiple Choice Questions
Eligibility / pre-requisite - None
Exam language - English
Exam format - Online
Passing score - 25
Exam Fees  - INR 1199


Reviews

$7.99
Format
Practice Exam
No. of Questions
30
Delivery & Access
Online, Lifelong Access
Test Modes
Practice, Exam
Take Free Test

Tags: Information Security Practice Exam,

Information Security Practice Exam

Information Security Practice Exam

  • Test Code:1112-P
  • Availability:In Stock
  • $7.99

  • Ex Tax:$7.99




Information Security Practice Exam


About Information Security
Information security refers to the processes and methodologies which are designed and implemented to protect print, electronic, or any other form of confidential, private and sensitive information or data from unauthorized access, use, misuse, disclosure, destruction, modification, or disruption.

Information Security programs are built around 3 objectives, commonly known as CIA – Confidentiality, Integrity, Availability.
•    Confidentiality – means information is not disclosed to unauthorized individuals, entities and process. For example if we say I have a password for my Gmail account but someone saw while I was doing a login into Gmail account. In that case my password has been compromised and Confidentiality has been breached.
•    Integrity – means maintaining accuracy and completeness of data. This means data cannot be edited in an unauthorized way. For example if an employee leaves an organisation then in that case data for that employee in all departments like accounts, should be updated to reflect status to JOB LEFT so that data is complete and accurate and in addition to this only authorized person should be allowed to edit employee data.
•    Availability – means information must be available when needed. For example if one needs to access information of a particular employee, in that case it requires collaboration from different organizational teams like network operations, development operations, incident response and policy/change management.

The means by which these principles are applied to an organization take the form of a security policy. This isn't a piece of security hardware or software; rather, it's a document that an enterprise draws up, based on its own specific needs and quirks, to establish what data needs to be protected and in what ways. These policies guide the organization's decisions around procuring cyber security tools, and also mandate employee behavior and responsibilities.

Why is Information Security important?
Information security performs four important roles:
•    It protects the organisation’s ability to function.
•    It enables the safe operation of applications implemented on the organisation’s IT systems.
•    It protects the data the organisation collects and uses.
•    It safeguards the technology the organisation uses.

Who should take the Information Security Exam?
•    IT security or audit professionals
•    Entrepreneurs
•    Anyone who wants to assess their information security skills
•    IT managers and senior executives
•    IT  consultants


Knowledge and Skills required for the Information Security Practice Exam

Candidate should have a good grasp of IT networking, operating system, web technology and cloud computing for succeeding in career as information security professional.


Information Security Practice Exam Objectives

Information Security exam focuses on verifying your skills and knowledge in concepts and application of information security for securing organizational computing resources.


Information Security Practice Exam Pre-requisite

Good knowledge of IT networking and computing is pre-requisite.





Information Security Certification Course Outline


1. Information Security Basics
1.1 What is information security
1.2 Need and Technical Terms
1.3 Skills Needed
1.4 Networking Basics
1.5 Penetration Testing

2. Cryptography
2.1 Cryptography Basics
2.2 Evolution and Data Encryption Methods
2.3 Symmetric and Asymmetric key Cryptography
2.4 Private and Public Key Exchange
2.5 Stream and Block Ciphers
2.6 Secret Key Cryptography
2.7 Message Authentication and Hash Functions
2.8 Digital Signatures and Public Key Infrastructure

3. Footprinting
3.1 Information Gathering
3.2 DNS, whois and ARIN records
3.3 Using traceroute, e-mail tracking and web spider
3.4 Google Hacking

4. Social Engineering
4.1 Social Engineering Concepts
4.2 Social Engineering Attack Types
4.3 Countermeasures for Social Engineering

5. Physical Security
5.1 Basics and Need
5.2 Physical Security Countermeasures

6. Network Scanning and Enumeration
6.1 Network Scanning Techniques
6.2 Scanners and Analyzers
6.3 HTTP tunneling and IP spoofing
6.4 Enumerating null sessions and SNMP enumeration

7. Network Attacks
7.1 TCP/IP Packet Formats and Ports
7.2 Firewall and IDS
7.3 Switch Attacks
7.4 Router Attacks
7.5 DoS, DDoS, Session Hijacking

8. Wireless Networks
8.1 Wireless LAN Basics
8.2 WLAN Security
8.3 WLAN Attacks
8.4 WLAN Attack Countermeasures

9. System Hacking
9.1 Password Attacks, Vulnerabilities and Countermeasure
9.2 Spyware
9.3 Rootkit
9.4 Steganography
9.5 Trojans
9.6 Computer worm
9.7 Backdoor
9.8 Buffer Overflow


Exam Format and Information
Certification name – Information Security Certification
Exam duration – 60 minutes
Exam type - Multiple Choice Questions
Eligibility / pre-requisite - None
Exam language - English
Exam format - Online
Passing score - 25
Exam Fees  - INR 1199